Re: OEM Policy Violation for Execute Stack

From: David Roberts <>
Date: Sun, 2 Mar 2014 21:29:49 +0000
Message-ID: <>

I think that this explains it to a greater depth than I understand it:

Which I found via this bilingual page:

As I understand it, some chips enable segregation of code from data in hardware as a way to eliminate buffer overrun security issues.

For this to be most effective the operating system needs to make sure that the data written to the stack is located in an area that the chip understands as data and should never be executed.

HTH. Dave

On Wed, Feb 26, 2014 at 2:08 PM, Jay Hostetter <>wrote:

> I inherited an environment, and I am going through the various policy
> violations in OEM ( The target databases are primarily
> All of my hosts have a policy violation "warning" for the
> "Execute Stack" policy, which says to "Ensure that the OS configuration
> parameter, which enables execution of code on the user stack, is not
> enabled." I have been searching docs, Oracle Support, and the internet,
> but have found almost nothing which tells me more specifics about this
> check. The underlying metric is "executeStackRep". The host OS is SUSE
> Linux Enterprise 11. I'd appreciate it if anyone could point me in the
> right direction for understanding this warning.
> Thank you,
> Jay

Received on Sun Mar 02 2014 - 22:29:49 CET

Original text of this message